Content Type How-to PingAccess Product PingFederate
This procedure assumes that you have configured PingFederate and PingAccess to talk to each other through OIDC. You need
to add Azure AD as an authentication source for PingAccess in PingFederate.
From the Authentication Selector screen in PingFederate, select the Add or Update
AuthN Context Attributebox next to the PingAccess entry, update your selector result
values to include Azure AD as an authentication requirement, and click
Save. See Configure the Requested AuthN Context Authentication Selector.
Extend the access token attribute contract to include groups, fulfill the
persistent grants from the authentication policy contract, and fulfill the
access token mapping with the persistent grant. See Configure policy and ID token settings.